Purpose:The goal of our research is to suggest specific Web metrics that are useful for evaluating and improving user navigation experience on informational websites.Design/methodology/approach:We revised metrics in a...Purpose:The goal of our research is to suggest specific Web metrics that are useful for evaluating and improving user navigation experience on informational websites.Design/methodology/approach:We revised metrics in a Web forensic framework proposed in the literature and defined the metrics of footprint,track and movement.Data were obtained from user clickstreams provided by a real estate site’s administrators.There were two phases of data analysis with the first phase on navigation behavior based on user footprints and tracks,and the second phase on navigational transition patterns based on user movements.Findings:Preliminary results suggest that the apartment pages were heavily-trafficked while the agent pages and related information pages were underused to a great extent.Navigation within the same category of pages was prevalent,especially when users navigated among the regional apartment listings.However,navigation of these pages was found to be inefficient.Research limitations:The suggestions for navigation design optimization provided in the paper are specific to this website,and their applicability to other online environments needs to be verified.Preference predications or personal recommendations are not made during the current stage of research.Practical implications:Our clickstream data analysis results offer a base for future research.Meanwhile,website administrators and managers can make better use of the readily available clickstream data to evaluate the effectiveness and efficiency of their site navigation design.Originality/value:Our empirical study is valuable to those seeking analysis metrics for evaluating and improving user navigation experience on informational websites based on clickstream data.Our attempts to analyze the log file in terms of footprint,track and movement will enrich the utilization of such trace data to engender a deeper understanding of users’within-site navigation behavior.展开更多
The user’s intent to seek online information has been an active area of research in user profiling.User profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interest...The user’s intent to seek online information has been an active area of research in user profiling.User profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interests,and motivations.Determining user characteristics can help capture implicit and explicit preferences and intentions for effective user-centric and customized content presentation.The user’s complete online experience in seeking information is a blend of activities such as searching,verifying,and sharing it on social platforms.However,a combination of multiple behaviors in profiling users has yet to be considered.This research takes a novel approach and explores user intent types based on multidimensional online behavior in information acquisition.This research explores information search,verification,and dissemination behavior and identifies diverse types of users based on their online engagement using machine learning.The research proposes a generic user profile template that explains the user characteristics based on the internet experience and uses it as ground truth for data annotation.User feedback is based on online behavior and practices collected by using a survey method.The participants include both males and females from different occupation sectors and different ages.The data collected is subject to feature engineering,and the significant features are presented to unsupervised machine learning methods to identify user intent classes or profiles and their characteristics.Different techniques are evaluated,and the K-Mean clustering method successfully generates five user groups observing different user characteristics with an average silhouette of 0.36 and a distortion score of 1136.Feature average is computed to identify user intent type characteristics.The user intent classes are then further generalized to create a user intent template with an Inter-Rater Reliability of 75%.This research successfully extracts different user types based on their preferences in online content,platforms,criteria,and frequency.The study also validates the proposed template on user feedback data through Inter-Rater Agreement process using an external human rater.展开更多
This study examines the database search behaviors of individuals, focusing on gender differences and the impact of planning habits on information retrieval. Data were collected from a survey of 198 respondents, catego...This study examines the database search behaviors of individuals, focusing on gender differences and the impact of planning habits on information retrieval. Data were collected from a survey of 198 respondents, categorized by their discipline, schooling background, internet usage, and information retrieval preferences. Key findings indicate that females are more likely to plan their searches in advance and prefer structured methods of information retrieval, such as using library portals and leading university websites. Males, however, tend to use web search engines and self-archiving methods more frequently. This analysis provides valuable insights for educational institutions and libraries to optimize their resources and services based on user behavior patterns.展开更多
In order to inhibit Free Riding in Peer-toPeer(P2P) file-sharing systems,the Free Riding Inhibition Mechanism Based on User Behavior(IMBUB) is proposed.IMBUB considers the regularity of user behavior and models user b...In order to inhibit Free Riding in Peer-toPeer(P2P) file-sharing systems,the Free Riding Inhibition Mechanism Based on User Behavior(IMBUB) is proposed.IMBUB considers the regularity of user behavior and models user behavior by analyzing many definitions and formulas.In IMBUB,Bandwidth Allocated Ratio,Incentive Mechanism Based on User Online Time,Double Reward Mechanism,Incentive Mechanism of Sharing for Permission and Inhibition Mechanism of White-washing Behavior are put forward to inhibit Free Riding and encourage user sharing.A P2P file system BITShare is designed and realized under the conditions of a campus network environment.The test results show that BITShare's Query Hit Ratio has a significant increase from 22% to 99%,and the sharing process in BITShare is very optimistic.Most users opt to use online time to exchange service quality instead of white-washing behavior,and the real white-ishing ratio in BITShare is lower than 1%.We confirm that IMBUB can effectively inhibit Free Riding behavior in P2P file-sharing systems.展开更多
Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese S...Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese Software Develop Net (CSDN) to provide a complete perspective on this research point. We concentrate on the following three aspects: complexity, correlation, and preference. From these analyses, we draw the following conclusions: firstly, a considerable number of users have not realized the importance of identification and are using very simple identifications that can be attacked very easily. Secondly, there is a strong complexity correlation among the three parts of identification. Thirdly, the top three passwords that users like are 123456789, 12345678 and 11111111, and the top three email providers that they prefer are NETEASE, qq and sina. Further, we provide some suggestions to improve the quality of user passwords.展开更多
In the recent Smart Home(SH)research work,intelligent service recommendation technique based on behavior recognition,it has been extensively preferred by researchers.However,most current research uses the Semantic rec...In the recent Smart Home(SH)research work,intelligent service recommendation technique based on behavior recognition,it has been extensively preferred by researchers.However,most current research uses the Semantic recognition to construct the user’s basic behavior model.This method is usually restricted by environmental factors,the way these models are built makes it impossible for them to dynamically match the services that might be provided in the user environment.To solve this problem,this paper proposes a Semantic behavior assistance(Semantic behavior assistance,SBA).By joining the semantic model on the intelligent gateway,building an SA model,in this way,a logical Internet networks for smart home is established.At the same time,a behavior assistant method based on SBA model is proposed,among them,the user environment-related entities,sensors,devices,and user-related knowledge models exist in the logical interconnection network of the SH system through the semantic model.In this paper,the data simulation experiment is carried out on the method.The experimental results show that the SBA model is better than the knowledge-based pre-defined model.展开更多
This paper proposes a novel framework to detect cyber-attacks using Machine Learning coupled with User Behavior Analytics.The framework models the user behavior as sequences of events representing the user activities ...This paper proposes a novel framework to detect cyber-attacks using Machine Learning coupled with User Behavior Analytics.The framework models the user behavior as sequences of events representing the user activities at such a network.The represented sequences are thenfitted into a recurrent neural network model to extract features that draw distinctive behavior for individual users.Thus,the model can recognize frequencies of regular behavior to profile the user manner in the network.The subsequent procedure is that the recurrent neural network would detect abnormal behavior by classifying unknown behavior to either regu-lar or irregular behavior.The importance of the proposed framework is due to the increase of cyber-attacks especially when the attack is triggered from such sources inside the network.Typically detecting inside attacks are much more challenging in that the security protocols can barely recognize attacks from trustful resources at the network,including users.Therefore,the user behavior can be extracted and ultimately learned to recognize insightful patterns in which the regular patterns reflect a normal network workflow.In contrast,the irregular patterns can trigger an alert for a potential cyber-attack.The framework has been fully described where the evaluation metrics have also been introduced.The experimental results show that the approach performed better compared to other approaches and AUC 0.97 was achieved using RNN-LSTM 1.The paper has been concluded with pro-viding the potential directions for future improvements.展开更多
Public parks provide many benefits to the community as the representatives of green area. The allocation of public places plays an extremely important role in the daily lives of inhabitants especially for recreational...Public parks provide many benefits to the community as the representatives of green area. The allocation of public places plays an extremely important role in the daily lives of inhabitants especially for recreational use that could enhance the quality of life of residents in the vicinity. To understand park users’ behavior is one of the most important prerequisites for as-sessing the participation in public service from the park users’ point of view. The pattern of park utilization on location and activity selection are important elements in behavioral study, while the public parks topograph may also influence the typical user’s be-havior. Questionnaire survey on park utilization was used to investigate the interaction between activity involvement and recrea-tional location with the use of linear discriminant analysis (LDA) model. The study found that public park users’ behavior is influenced not only by social characteristics but also by the recreational activities and their specific location characteristics. We found that about 45 percent of park visitors are local residents living within a radius of 3 km preferred travel to parks near their residential area. This implies that location selection behavior is correlated with travel distance, travel time and travel cost. Visit frequencies and on site expenditures reflect the recreation behavior for different type of activities. The overall information can be usefully applied by decision makers to launch appropriate public policy in consistence with the useful results of this study.展开更多
As nearly half of the incidents in enterprise security have been triggered by insiders,it is important to deploy a more intelligent defense system to assist enterprises in pinpointing and resolving the incidents cause...As nearly half of the incidents in enterprise security have been triggered by insiders,it is important to deploy a more intelligent defense system to assist enterprises in pinpointing and resolving the incidents caused by insiders or malicious software(malware)in real-time.Failing to do so may cause a serious loss of reputation as well as business.At the same time,modern network traffic has dynamic patterns,high complexity,and large volumes that make it more difficult to detect malware early.The ability to learn tasks sequentially is crucial to the development of artificial intelligence.Existing neurogenetic computation models with deep-learning techniques are able to detect complex patterns;however,the models have limitations,including catastrophic forgetfulness,and require intensive computational resources.As defense systems using deep-learning models require more time to learn new traffic patterns,they cannot perform fully online(on-the-fly)learning.Hence,an intelligent attack/malware detection system with on-the-fly learning capability is required.For this paper,a memory-prediction framework was adopted,and a simplified single cell assembled sequential hierarchical memory(s.SCASHM)model instead of the hierarchical temporal memory(HTM)model is proposed to speed up learning convergence to achieve onthe-fly learning.The s.SCASHM consists of a Single Neuronal Cell(SNC)model and a simplified Sequential Hierarchical Superset(SHS)platform.The s.SCASHMis implemented as the prediction engine of a user behavior analysis tool to detect insider attacks/anomalies.The experimental results show that the proposed memory model can predict users’traffic behavior with accuracy level ranging from 72%to 83%while performing on-the-fly learning.展开更多
With the rapid development of science and technology and the increasing popularity of the Internet,the number of network users is gradually expanding,and the behavior of network users is becoming more and more complex...With the rapid development of science and technology and the increasing popularity of the Internet,the number of network users is gradually expanding,and the behavior of network users is becoming more and more complex.Users’actual demand for resources on the network application platform is closely related to their historical behavior records.Therefore,it is very important to analyze the user behavior path conversion rate.Therefore,this paper analyses and studies user behavior path based on sales data.Through analyzing the user quality of the website as well as the user’s repurchase rate,repurchase rate and retention rate in the website,we can get some user habits and use the data to guide the website optimization.展开更多
Along with the development of socialized media and self-help tourism,tourism industry has been going into tourism social times.Based on technology acceptance model,use and gratifications approach,and weighted and calc...Along with the development of socialized media and self-help tourism,tourism industry has been going into tourism social times.Based on technology acceptance model,use and gratifications approach,and weighted and calculated needs theory,this study explored the impact of perceived popularity,perceived characteristics,and perceived need on the use of tourism social network site and being a member of it.This study also discussed the interaction of perceived popularity,perceived characteristics,and perceived need.The findings of this paper could be used to help the management operator pay attention to strengthen the function of tourism social network site in order to provide better information for users and satisfied the needs of users.展开更多
Purpose: In the Web 2.0 era,leveraging the collective power of user knowledge contributions has become an important part of the study of collective intelligence. This research aims to investigate the factors which inf...Purpose: In the Web 2.0 era,leveraging the collective power of user knowledge contributions has become an important part of the study of collective intelligence. This research aims to investigate the factors which influence knowledge contribution behavior of social networking sites(SNS) users.Design/methodology/approach: The data were obtained from an online survey of 251 social networking sites users. Structural equation modeling analysis was used to validate the proposed model.Findings: Our survey shows that the individuals' motivation for knowledge contribution,their capability of contributing knowledge,interpersonal trust and their own habits positively influence their knowledge contribution behavior,but reward does not significantly influence knowledge contribution in the online virtual community.Research limitations: Respondents of our online survey are mainly undergraduate and graduate students. A limited sample group cannot represent all of the population. A larger survey involving more SNS users may be useful.Practical implications: The results have provided some theoretical basis for promoting knowledge contribution and user viscosity.Originality/value: Few studies have investigated the impact of social influence and user habits on knowledge contribution behavior of SNS users. This study can make a theoretical contribution by examining how the social influence processes and habits affect one's knowledge contribution behavior using online communities.展开更多
The article tries to discover the major authors in the field of information seeking behavior via social network analysis. It is to be accomplished through a literature review and also by focusing on a graphic map show...The article tries to discover the major authors in the field of information seeking behavior via social network analysis. It is to be accomplished through a literature review and also by focusing on a graphic map showing the seven most productive coauthors in this field. Based on these seven authors' work, five probable research directions about information seeking behavior are discerned and presented.展开更多
As social media and online activity continue to pervade all age groups, it serves as a crucial platform for sharing personal experiences and opinions as well as information about attitudes and preferences for certain ...As social media and online activity continue to pervade all age groups, it serves as a crucial platform for sharing personal experiences and opinions as well as information about attitudes and preferences for certain interests or purchases. This generates a wealth of behavioral data, which, while invaluable to businesses, researchers, policymakers, and the cybersecurity sector, presents significant challenges due to its unstructured nature. Existing tools for analyzing this data often lack the capability to effectively retrieve and process it comprehensively. This paper addresses the need for an advanced analytical tool that ethically and legally collects and analyzes social media data and online activity logs, constructing detailed and structured user profiles. It reviews current solutions, highlights their limitations, and introduces a new approach, the Advanced Social Analyzer (ASAN), that bridges these gaps. The proposed solutions technical aspects, implementation, and evaluation are discussed, with results compared to existing methodologies. The paper concludes by suggesting future research directions to further enhance the utility and effectiveness of social media data analysis.展开更多
Information diffusion in online social networks is induced by the event of forwarding information for users, and latency exists widely in user spreading behaviors. Little work has been done to reveal the effect of lat...Information diffusion in online social networks is induced by the event of forwarding information for users, and latency exists widely in user spreading behaviors. Little work has been done to reveal the effect of latency on the diffusion process. In this paper, we propose a propagation model in which nodes may suspend their spreading actions for a waiting period of stochastic length. These latent nodes may recover their activity again. Meanwhile, the mechanism of forwarding information is also introduced into the diffusion model. Mean-field analysis and numerical simulations indicate that our model has three nontrivial results. First, the spreading threshold does not correlate with latency in neither homogeneous nor heterogeneous networks, but depends on the spreading and refractory parameter. Furthermore, latency affects the diffusion process and changes the infection scale. A large or small latency parameter leads to a larger final diffusion extent, but the intrinsic dynamics is different. Large latency implies forwarding information rapidly, while small latency prevents nodes from dropping out of interactions. In addition, the betweenness is a better descriptor to identify influential nodes in the model with latency, compared with the coreness and degree. These results are helpful in understanding some collective phenomena of the diffusion process and taking measures to restrain a rumor in social networks.展开更多
In order to reduce the maintenance cost of structured Peer-to-Peer (P2P),Clone Node Protocol (CNP) based on user behavior is proposed.CNP considers the regularity of user behavior and uses the method of clone node.A B...In order to reduce the maintenance cost of structured Peer-to-Peer (P2P),Clone Node Protocol (CNP) based on user behavior is proposed.CNP considers the regularity of user behavior and uses the method of clone node.A Bidirectional Clone Node Chord model (BCNChord) based on CNP protocol is designed and realized.In BCNChord,Anticlockwise Searching Algorithm,Difference Push Synchronize Algorithm and Optimal Maintenance Algorithm are put forward to increase the performances.In experiments,according to the frequency of nodes,the maintenance cost of BCNChord can be 3.5%~32.5% lower than that of Chord.In the network of 212 nodes,the logic path hop is steady at 6,which is much more prior to 12 of Chord and 10 of CNChord.Theoretical analysis and experimental results show that BCNChord can effectively reduce the maintenance cost of its structure and simultaneously improve the query efficiency up to (1/4)O(logN).BCNChord is more suitable for highly dynamic environment and higher real-time system.展开更多
Purpose: This study aims to explore factors affecting continuance intention of mobile reading. Design/methodology/approach: Drawing on the unified theory of acceptance and use of technology (UTAUT), and integratin...Purpose: This study aims to explore factors affecting continuance intention of mobile reading. Design/methodology/approach: Drawing on the unified theory of acceptance and use of technology (UTAUT), and integrating perceived enjoyment, we put forward a theoretical research model of factors affecting continuance intention of mobile reading. Using 186 valid data collected through a questionnaire survey, we conducted data analysis with the partial least squares structural equation modeling (PLS-SEM). Findings: The results show that performance expectancy, effort expectancy, social influence and perceived enjoyment all have positive impacts on continuance intention. Among them, perceived enjoyment has the most significant effect on continuance intention, followed by performance expectancy. In addition, effort expectancy significantly influences perceived enjoyment. Contrary to our expectation, facilitating conditions have no impact on continuance intention. Practical implications: This study could help mobile data service providers to foster users' continuous usage of mobile reading. Research limitations: This study focused only on the effect of perceived enjoyment as an internal motivation on continuance intention of mobile reading, and other possible factors were not considered. Also, continuance intention may be different from the actual behavior. Furthermore, data of student users was collected from one university in China, and was cross-sectional, while working samples were not considered. Originality value: This study considers the effects of both external and internal motivation on continuance intention of mobile reading. The results highlight the role of perceived enjoyment in building users' continuance intention of mobile reading.展开更多
Live video streaming is one of the newly emerged services over the Internet that has attracted immense interest of the service providers.Since Internet was not designed for such services during its inception,such a se...Live video streaming is one of the newly emerged services over the Internet that has attracted immense interest of the service providers.Since Internet was not designed for such services during its inception,such a service poses some serious challenges including cost and scalability.Peer-to-Peer(P2P)Internet Protocol Television(IPTV)is an application-level distributed paradigm to offer live video contents.In terms of ease of deployment,it has emerged as a serious alternative to client server,Content Delivery Network(CDN)and IP multicast solutions.Nevertheless,P2P approach has struggled to provide the desired streaming quality due to a number of issues.Stability of peers in a network is one of themajor issues among these.Most of the existing approaches address this issue through older-stable principle.This paper first extensively investigates the older-stable principle to observe its validity in different scenarios.It is observed that the older-stable principle does not hold in several of them.Then,it utilizes machine learning approach to predict the stability of peers.This work evaluates the accuracy of severalmachine learning algorithms over the prediction of stability,where the Gradient Boosting Regressor(GBR)out-performs other algorithms.Finally,this work presents a proof-of-concept simulation to compare the effectiveness of older-stable rule and machine learning-based predictions for the stabilization of the overlay.The results indicate that machine learning-based stability estimation significantly improves the system.展开更多
In social networks,many complex factors affect the prediction of user forwarding behavior.This paper proposes an improved SVM prediction method for user forwarding behavior of hot topics to improve prediction accuracy...In social networks,many complex factors affect the prediction of user forwarding behavior.This paper proposes an improved SVM prediction method for user forwarding behavior of hot topics to improve prediction accuracy.Firstly,we consider that the improved Cuckoo Search algorithm can select the optimal penalty parameters and kernel function parameters to optimize the SVM and thus predict the user's forwarding behavior.Secondly,this paper considers the factors that affect the user forwarding behavior comprehensively from the user's own factors and external factors.Finally,based on the characteristics of the user's forwarding behavior changing over time,the time-slicing method is used to predict the trend of hot topics.Experiments show that the method can accurately predict the user's forwarding behavior and can sense the trend of hot topics.展开更多
Online social networking sites ( OSNS) ,as a popular social media platform,have been developed massively for business and research purposes. In this paper,it investigated the impact of community structure in online so...Online social networking sites ( OSNS) ,as a popular social media platform,have been developed massively for business and research purposes. In this paper,it investigated the impact of community structure in online social network on information propagation. A SI (Susceptible-Infected) model based on community structure was proposed. In the SI model,the heterogeneity of user's active time was taken into account. From the results,it was found that the number of links among communities determines the fraction of infected nodes. With the increase of the number of groups G,however,the fraction of infected nodes remains approximately constant. The simulation results will be of great significance: the information will last relatively short for group networks which have either a small or a large number of groups. The results can be useful for optimizing or controlling information,such as propagating rumors in online social networks.展开更多
基金supported by the National Natural Science Foundation of China(Grant No.:71203163)the Foundation for Humanities and Social Sciences of the Chinese Ministry of Education(Grant No.:12YJC870011)
文摘Purpose:The goal of our research is to suggest specific Web metrics that are useful for evaluating and improving user navigation experience on informational websites.Design/methodology/approach:We revised metrics in a Web forensic framework proposed in the literature and defined the metrics of footprint,track and movement.Data were obtained from user clickstreams provided by a real estate site’s administrators.There were two phases of data analysis with the first phase on navigation behavior based on user footprints and tracks,and the second phase on navigational transition patterns based on user movements.Findings:Preliminary results suggest that the apartment pages were heavily-trafficked while the agent pages and related information pages were underused to a great extent.Navigation within the same category of pages was prevalent,especially when users navigated among the regional apartment listings.However,navigation of these pages was found to be inefficient.Research limitations:The suggestions for navigation design optimization provided in the paper are specific to this website,and their applicability to other online environments needs to be verified.Preference predications or personal recommendations are not made during the current stage of research.Practical implications:Our clickstream data analysis results offer a base for future research.Meanwhile,website administrators and managers can make better use of the readily available clickstream data to evaluate the effectiveness and efficiency of their site navigation design.Originality/value:Our empirical study is valuable to those seeking analysis metrics for evaluating and improving user navigation experience on informational websites based on clickstream data.Our attempts to analyze the log file in terms of footprint,track and movement will enrich the utilization of such trace data to engender a deeper understanding of users’within-site navigation behavior.
文摘The user’s intent to seek online information has been an active area of research in user profiling.User profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interests,and motivations.Determining user characteristics can help capture implicit and explicit preferences and intentions for effective user-centric and customized content presentation.The user’s complete online experience in seeking information is a blend of activities such as searching,verifying,and sharing it on social platforms.However,a combination of multiple behaviors in profiling users has yet to be considered.This research takes a novel approach and explores user intent types based on multidimensional online behavior in information acquisition.This research explores information search,verification,and dissemination behavior and identifies diverse types of users based on their online engagement using machine learning.The research proposes a generic user profile template that explains the user characteristics based on the internet experience and uses it as ground truth for data annotation.User feedback is based on online behavior and practices collected by using a survey method.The participants include both males and females from different occupation sectors and different ages.The data collected is subject to feature engineering,and the significant features are presented to unsupervised machine learning methods to identify user intent classes or profiles and their characteristics.Different techniques are evaluated,and the K-Mean clustering method successfully generates five user groups observing different user characteristics with an average silhouette of 0.36 and a distortion score of 1136.Feature average is computed to identify user intent type characteristics.The user intent classes are then further generalized to create a user intent template with an Inter-Rater Reliability of 75%.This research successfully extracts different user types based on their preferences in online content,platforms,criteria,and frequency.The study also validates the proposed template on user feedback data through Inter-Rater Agreement process using an external human rater.
文摘This study examines the database search behaviors of individuals, focusing on gender differences and the impact of planning habits on information retrieval. Data were collected from a survey of 198 respondents, categorized by their discipline, schooling background, internet usage, and information retrieval preferences. Key findings indicate that females are more likely to plan their searches in advance and prefer structured methods of information retrieval, such as using library portals and leading university websites. Males, however, tend to use web search engines and self-archiving methods more frequently. This analysis provides valuable insights for educational institutions and libraries to optimize their resources and services based on user behavior patterns.
基金This work was partly supported by 2012 Outstanding Talents Project of Beijing Organization Department under Grant No.2012D00501700005,Science and Technology Project of Beijing Municipal Education Commission under Grant No.KM201110016006,National Natural Science Foundation of China under Grant No.61100205
文摘In order to inhibit Free Riding in Peer-toPeer(P2P) file-sharing systems,the Free Riding Inhibition Mechanism Based on User Behavior(IMBUB) is proposed.IMBUB considers the regularity of user behavior and models user behavior by analyzing many definitions and formulas.In IMBUB,Bandwidth Allocated Ratio,Incentive Mechanism Based on User Online Time,Double Reward Mechanism,Incentive Mechanism of Sharing for Permission and Inhibition Mechanism of White-washing Behavior are put forward to inhibit Free Riding and encourage user sharing.A P2P file system BITShare is designed and realized under the conditions of a campus network environment.The test results show that BITShare's Query Hit Ratio has a significant increase from 22% to 99%,and the sharing process in BITShare is very optimistic.Most users opt to use online time to exchange service quality instead of white-washing behavior,and the real white-ishing ratio in BITShare is lower than 1%.We confirm that IMBUB can effectively inhibit Free Riding behavior in P2P file-sharing systems.
基金supported by the Foundation for Key Program of Ministry of Education, China under Grant No.311007National Science Foundation Project of China under Grants No. 61202079, No.61170225, No.61271199+1 种基金the Fundamental Research Funds for the Central Universities under Grant No.FRF-TP-09-015Athe Fundamental Research Funds in Beijing Jiaotong University under Grant No.W11JB00630
文摘Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese Software Develop Net (CSDN) to provide a complete perspective on this research point. We concentrate on the following three aspects: complexity, correlation, and preference. From these analyses, we draw the following conclusions: firstly, a considerable number of users have not realized the importance of identification and are using very simple identifications that can be attacked very easily. Secondly, there is a strong complexity correlation among the three parts of identification. Thirdly, the top three passwords that users like are 123456789, 12345678 and 11111111, and the top three email providers that they prefer are NETEASE, qq and sina. Further, we provide some suggestions to improve the quality of user passwords.
基金supported by the National Natural Science Foundation of China(61772196,61472136)the Hunan Provincial Focus Social Science Fund(2016ZDB006)+2 种基金Hunan Provincial Social Science Achievement Review Committee results in appraisal identification project(Xiang social assessment 2016JD05)Key Project of Hunan Provincial Social Science Achievement Review Committee(XSP 19ZD1005)financial support provided by the Key Laboratory of Hunan Province for New Retail Virtual Reality Technology(2017TP1026)。
文摘In the recent Smart Home(SH)research work,intelligent service recommendation technique based on behavior recognition,it has been extensively preferred by researchers.However,most current research uses the Semantic recognition to construct the user’s basic behavior model.This method is usually restricted by environmental factors,the way these models are built makes it impossible for them to dynamically match the services that might be provided in the user environment.To solve this problem,this paper proposes a Semantic behavior assistance(Semantic behavior assistance,SBA).By joining the semantic model on the intelligent gateway,building an SA model,in this way,a logical Internet networks for smart home is established.At the same time,a behavior assistant method based on SBA model is proposed,among them,the user environment-related entities,sensors,devices,and user-related knowledge models exist in the logical interconnection network of the SH system through the semantic model.In this paper,the data simulation experiment is carried out on the method.The experimental results show that the SBA model is better than the knowledge-based pre-defined model.
基金supported by the fund received from Al Baha University,8/1440.
文摘This paper proposes a novel framework to detect cyber-attacks using Machine Learning coupled with User Behavior Analytics.The framework models the user behavior as sequences of events representing the user activities at such a network.The represented sequences are thenfitted into a recurrent neural network model to extract features that draw distinctive behavior for individual users.Thus,the model can recognize frequencies of regular behavior to profile the user manner in the network.The subsequent procedure is that the recurrent neural network would detect abnormal behavior by classifying unknown behavior to either regu-lar or irregular behavior.The importance of the proposed framework is due to the increase of cyber-attacks especially when the attack is triggered from such sources inside the network.Typically detecting inside attacks are much more challenging in that the security protocols can barely recognize attacks from trustful resources at the network,including users.Therefore,the user behavior can be extracted and ultimately learned to recognize insightful patterns in which the regular patterns reflect a normal network workflow.In contrast,the irregular patterns can trigger an alert for a potential cyber-attack.The framework has been fully described where the evaluation metrics have also been introduced.The experimental results show that the approach performed better compared to other approaches and AUC 0.97 was achieved using RNN-LSTM 1.The paper has been concluded with pro-viding the potential directions for future improvements.
文摘Public parks provide many benefits to the community as the representatives of green area. The allocation of public places plays an extremely important role in the daily lives of inhabitants especially for recreational use that could enhance the quality of life of residents in the vicinity. To understand park users’ behavior is one of the most important prerequisites for as-sessing the participation in public service from the park users’ point of view. The pattern of park utilization on location and activity selection are important elements in behavioral study, while the public parks topograph may also influence the typical user’s be-havior. Questionnaire survey on park utilization was used to investigate the interaction between activity involvement and recrea-tional location with the use of linear discriminant analysis (LDA) model. The study found that public park users’ behavior is influenced not only by social characteristics but also by the recreational activities and their specific location characteristics. We found that about 45 percent of park visitors are local residents living within a radius of 3 km preferred travel to parks near their residential area. This implies that location selection behavior is correlated with travel distance, travel time and travel cost. Visit frequencies and on site expenditures reflect the recreation behavior for different type of activities. The overall information can be usefully applied by decision makers to launch appropriate public policy in consistence with the useful results of this study.
基金This research was funded by Scientific Research Deanship,Albaha University,under the Grant Number:[24/1440].
文摘As nearly half of the incidents in enterprise security have been triggered by insiders,it is important to deploy a more intelligent defense system to assist enterprises in pinpointing and resolving the incidents caused by insiders or malicious software(malware)in real-time.Failing to do so may cause a serious loss of reputation as well as business.At the same time,modern network traffic has dynamic patterns,high complexity,and large volumes that make it more difficult to detect malware early.The ability to learn tasks sequentially is crucial to the development of artificial intelligence.Existing neurogenetic computation models with deep-learning techniques are able to detect complex patterns;however,the models have limitations,including catastrophic forgetfulness,and require intensive computational resources.As defense systems using deep-learning models require more time to learn new traffic patterns,they cannot perform fully online(on-the-fly)learning.Hence,an intelligent attack/malware detection system with on-the-fly learning capability is required.For this paper,a memory-prediction framework was adopted,and a simplified single cell assembled sequential hierarchical memory(s.SCASHM)model instead of the hierarchical temporal memory(HTM)model is proposed to speed up learning convergence to achieve onthe-fly learning.The s.SCASHM consists of a Single Neuronal Cell(SNC)model and a simplified Sequential Hierarchical Superset(SHS)platform.The s.SCASHMis implemented as the prediction engine of a user behavior analysis tool to detect insider attacks/anomalies.The experimental results show that the proposed memory model can predict users’traffic behavior with accuracy level ranging from 72%to 83%while performing on-the-fly learning.
基金funded by the Open Foundation for the University Innovation Platform in the Hunan Province,grant number 18K103Open project,Grant Number 20181901CRP03,20181901CRP04,20181901CRP05+1 种基金Hunan Provincial Education Science 13th Five-Year Plan(Grant No.XJK016BXX001),Social Science Foundation of Hunan Province(Grant No.17YBA049)supported by the project 18K103。
文摘With the rapid development of science and technology and the increasing popularity of the Internet,the number of network users is gradually expanding,and the behavior of network users is becoming more and more complex.Users’actual demand for resources on the network application platform is closely related to their historical behavior records.Therefore,it is very important to analyze the user behavior path conversion rate.Therefore,this paper analyses and studies user behavior path based on sales data.Through analyzing the user quality of the website as well as the user’s repurchase rate,repurchase rate and retention rate in the website,we can get some user habits and use the data to guide the website optimization.
基金This study was supported by a grant from the Projects of the National Natural Science Foundation of China(No.72074053).
文摘Along with the development of socialized media and self-help tourism,tourism industry has been going into tourism social times.Based on technology acceptance model,use and gratifications approach,and weighted and calculated needs theory,this study explored the impact of perceived popularity,perceived characteristics,and perceived need on the use of tourism social network site and being a member of it.This study also discussed the interaction of perceived popularity,perceived characteristics,and perceived need.The findings of this paper could be used to help the management operator pay attention to strengthen the function of tourism social network site in order to provide better information for users and satisfied the needs of users.
基金supported by the National Social Science Foundation of China(Grant Nos.:10CTQ010 and 11CTQ038)Wuhan University Development Program for Researchers Born after the 1970s
文摘Purpose: In the Web 2.0 era,leveraging the collective power of user knowledge contributions has become an important part of the study of collective intelligence. This research aims to investigate the factors which influence knowledge contribution behavior of social networking sites(SNS) users.Design/methodology/approach: The data were obtained from an online survey of 251 social networking sites users. Structural equation modeling analysis was used to validate the proposed model.Findings: Our survey shows that the individuals' motivation for knowledge contribution,their capability of contributing knowledge,interpersonal trust and their own habits positively influence their knowledge contribution behavior,but reward does not significantly influence knowledge contribution in the online virtual community.Research limitations: Respondents of our online survey are mainly undergraduate and graduate students. A limited sample group cannot represent all of the population. A larger survey involving more SNS users may be useful.Practical implications: The results have provided some theoretical basis for promoting knowledge contribution and user viscosity.Originality/value: Few studies have investigated the impact of social influence and user habits on knowledge contribution behavior of SNS users. This study can make a theoretical contribution by examining how the social influence processes and habits affect one's knowledge contribution behavior using online communities.
文摘The article tries to discover the major authors in the field of information seeking behavior via social network analysis. It is to be accomplished through a literature review and also by focusing on a graphic map showing the seven most productive coauthors in this field. Based on these seven authors' work, five probable research directions about information seeking behavior are discerned and presented.
文摘As social media and online activity continue to pervade all age groups, it serves as a crucial platform for sharing personal experiences and opinions as well as information about attitudes and preferences for certain interests or purchases. This generates a wealth of behavioral data, which, while invaluable to businesses, researchers, policymakers, and the cybersecurity sector, presents significant challenges due to its unstructured nature. Existing tools for analyzing this data often lack the capability to effectively retrieve and process it comprehensively. This paper addresses the need for an advanced analytical tool that ethically and legally collects and analyzes social media data and online activity logs, constructing detailed and structured user profiles. It reviews current solutions, highlights their limitations, and introduces a new approach, the Advanced Social Analyzer (ASAN), that bridges these gaps. The proposed solutions technical aspects, implementation, and evaluation are discussed, with results compared to existing methodologies. The paper concludes by suggesting future research directions to further enhance the utility and effectiveness of social media data analysis.
基金supported by the National Natural Science Foundation of China(Grant Nos.61401015 and 61271308)the Fundamental Research Funds for the Central Universities,China(Grant No.2014JBM018)the Talent Fund of Beijing Jiaotong University,China(Grant No.2015RC013)
文摘Information diffusion in online social networks is induced by the event of forwarding information for users, and latency exists widely in user spreading behaviors. Little work has been done to reveal the effect of latency on the diffusion process. In this paper, we propose a propagation model in which nodes may suspend their spreading actions for a waiting period of stochastic length. These latent nodes may recover their activity again. Meanwhile, the mechanism of forwarding information is also introduced into the diffusion model. Mean-field analysis and numerical simulations indicate that our model has three nontrivial results. First, the spreading threshold does not correlate with latency in neither homogeneous nor heterogeneous networks, but depends on the spreading and refractory parameter. Furthermore, latency affects the diffusion process and changes the infection scale. A large or small latency parameter leads to a larger final diffusion extent, but the intrinsic dynamics is different. Large latency implies forwarding information rapidly, while small latency prevents nodes from dropping out of interactions. In addition, the betweenness is a better descriptor to identify influential nodes in the model with latency, compared with the coreness and degree. These results are helpful in understanding some collective phenomena of the diffusion process and taking measures to restrain a rumor in social networks.
基金supported by the National Natural Science Foundation of China under Grant No.61100205Science and Technology Project of Beijing Municipal Education Commission under Grant No.KM201110016006Doctor Start-up Foundation of BUCEA under Grant No.101002508
文摘In order to reduce the maintenance cost of structured Peer-to-Peer (P2P),Clone Node Protocol (CNP) based on user behavior is proposed.CNP considers the regularity of user behavior and uses the method of clone node.A Bidirectional Clone Node Chord model (BCNChord) based on CNP protocol is designed and realized.In BCNChord,Anticlockwise Searching Algorithm,Difference Push Synchronize Algorithm and Optimal Maintenance Algorithm are put forward to increase the performances.In experiments,according to the frequency of nodes,the maintenance cost of BCNChord can be 3.5%~32.5% lower than that of Chord.In the network of 212 nodes,the logic path hop is steady at 6,which is much more prior to 12 of Chord and 10 of CNChord.Theoretical analysis and experimental results show that BCNChord can effectively reduce the maintenance cost of its structure and simultaneously improve the query efficiency up to (1/4)O(logN).BCNChord is more suitable for highly dynamic environment and higher real-time system.
基金supported by the National Natural Science Foundation of China(Grant No.:71403301)
文摘Purpose: This study aims to explore factors affecting continuance intention of mobile reading. Design/methodology/approach: Drawing on the unified theory of acceptance and use of technology (UTAUT), and integrating perceived enjoyment, we put forward a theoretical research model of factors affecting continuance intention of mobile reading. Using 186 valid data collected through a questionnaire survey, we conducted data analysis with the partial least squares structural equation modeling (PLS-SEM). Findings: The results show that performance expectancy, effort expectancy, social influence and perceived enjoyment all have positive impacts on continuance intention. Among them, perceived enjoyment has the most significant effect on continuance intention, followed by performance expectancy. In addition, effort expectancy significantly influences perceived enjoyment. Contrary to our expectation, facilitating conditions have no impact on continuance intention. Practical implications: This study could help mobile data service providers to foster users' continuous usage of mobile reading. Research limitations: This study focused only on the effect of perceived enjoyment as an internal motivation on continuance intention of mobile reading, and other possible factors were not considered. Also, continuance intention may be different from the actual behavior. Furthermore, data of student users was collected from one university in China, and was cross-sectional, while working samples were not considered. Originality value: This study considers the effects of both external and internal motivation on continuance intention of mobile reading. The results highlight the role of perceived enjoyment in building users' continuance intention of mobile reading.
文摘Live video streaming is one of the newly emerged services over the Internet that has attracted immense interest of the service providers.Since Internet was not designed for such services during its inception,such a service poses some serious challenges including cost and scalability.Peer-to-Peer(P2P)Internet Protocol Television(IPTV)is an application-level distributed paradigm to offer live video contents.In terms of ease of deployment,it has emerged as a serious alternative to client server,Content Delivery Network(CDN)and IP multicast solutions.Nevertheless,P2P approach has struggled to provide the desired streaming quality due to a number of issues.Stability of peers in a network is one of themajor issues among these.Most of the existing approaches address this issue through older-stable principle.This paper first extensively investigates the older-stable principle to observe its validity in different scenarios.It is observed that the older-stable principle does not hold in several of them.Then,it utilizes machine learning approach to predict the stability of peers.This work evaluates the accuracy of severalmachine learning algorithms over the prediction of stability,where the Gradient Boosting Regressor(GBR)out-performs other algorithms.Finally,this work presents a proof-of-concept simulation to compare the effectiveness of older-stable rule and machine learning-based predictions for the stabilization of the overlay.The results indicate that machine learning-based stability estimation significantly improves the system.
基金This paper is partially supported by the National Natural Science Foundation of China(Grant No.62006032,62072066)Science and Technology Research Program of Chongqing Municipal Education Commission(Grant No.KJZD-K201900603,KJQN201900629)Chongqing Technology Innovation and Application Development Project(Grant No.cstc2020jscx-msxmX0150).
文摘In social networks,many complex factors affect the prediction of user forwarding behavior.This paper proposes an improved SVM prediction method for user forwarding behavior of hot topics to improve prediction accuracy.Firstly,we consider that the improved Cuckoo Search algorithm can select the optimal penalty parameters and kernel function parameters to optimize the SVM and thus predict the user's forwarding behavior.Secondly,this paper considers the factors that affect the user forwarding behavior comprehensively from the user's own factors and external factors.Finally,based on the characteristics of the user's forwarding behavior changing over time,the time-slicing method is used to predict the trend of hot topics.Experiments show that the method can accurately predict the user's forwarding behavior and can sense the trend of hot topics.
基金Sponsored by the National Basic Research Program of China (973 Program) (Grant No. 2012CB315805)National Natural Science Foundation ofChina (Grant No. 71172135)
文摘Online social networking sites ( OSNS) ,as a popular social media platform,have been developed massively for business and research purposes. In this paper,it investigated the impact of community structure in online social network on information propagation. A SI (Susceptible-Infected) model based on community structure was proposed. In the SI model,the heterogeneity of user's active time was taken into account. From the results,it was found that the number of links among communities determines the fraction of infected nodes. With the increase of the number of groups G,however,the fraction of infected nodes remains approximately constant. The simulation results will be of great significance: the information will last relatively short for group networks which have either a small or a large number of groups. The results can be useful for optimizing or controlling information,such as propagating rumors in online social networks.